Sciweavers

3299 search results - page 116 / 660
» Privacy and Trusted Computing
Sort
View
CSE
2009
IEEE
15 years 8 months ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
14 years 8 months ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen
ICDCS
2011
IEEE
14 years 4 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
131
Voted
BROADNETS
2005
IEEE
15 years 10 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
FTHCI
2007
66views more  FTHCI 2007»
15 years 4 months ago
End-User Privacy in Human-Computer Interaction
The purpose of this article is twofold. First, we summarize research on the topic of privacy in Human–Computer Interaction (HCI), outlining current approaches, results, and tren...
Giovanni Iachello, Jason I. Hong